work2 – Rufo Guerreschi's Bloghttps://www.rufoguerreschi.com
Thu, 08 Feb 2018 11:15:58 +0000en-UShourly1https://wordpress.org/?v=4.9.448222923Sono lo SPID e il software libero sufficienti per una partecipazione deliberativa elettronica comunale in larga scala?!https://www.rufoguerreschi.com/2017/02/12/sono-lo-spid-e-il-software-libero-sufficienti-per-una-partecipazione-deliberativa-elettronica-comunale-in-larga-scala/
https://www.rufoguerreschi.com/2017/02/12/sono-lo-spid-e-il-software-libero-sufficienti-per-una-partecipazione-deliberativa-elettronica-comunale-in-larga-scala/#respondSun, 12 Feb 2017 13:20:25 +0000http://www.rufoguerreschi.com/?p=1230Continue reading →]]>https://www.rufoguerreschi.com/2017/02/12/sono-lo-spid-e-il-software-libero-sufficienti-per-una-partecipazione-deliberativa-elettronica-comunale-in-larga-scala/feed/01230“Head of NSA’s Elite Hacking Unit: How We Hack” by ABC Newshttps://www.rufoguerreschi.com/2016/02/03/head-of-nsas-elite-hacking-unit-how-we-hack-by-abc-news/
https://www.rufoguerreschi.com/2016/02/03/head-of-nsas-elite-hacking-unit-how-we-hack-by-abc-news/#respondWed, 03 Feb 2016 10:32:47 +0000http://www.rufoguerreschi.com/?p=1187Continue reading →]]>https://www.rufoguerreschi.com/2016/02/03/head-of-nsas-elite-hacking-unit-how-we-hack-by-abc-news/feed/01187We arw alredy in a “digital explosion” a head of Gartner sayshttps://www.rufoguerreschi.com/2015/12/10/we-arw-alredy-in-a-digital-explosion-a-head-of-gartner-says/
https://www.rufoguerreschi.com/2015/12/10/we-arw-alredy-in-a-digital-explosion-a-head-of-gartner-says/#respondThu, 10 Dec 2015 04:09:07 +0000http://www.rufoguerreschi.com/?p=1119https://www.rufoguerreschi.com/2015/12/10/we-arw-alredy-in-a-digital-explosion-a-head-of-gartner-says/feed/01119Welcome to Linear City 2.0, a social and human urban redevelopment concepthttps://www.rufoguerreschi.com/2015/11/12/welcome-to-linear-city-2-0-a-social-and-human-urban-redevelopment-concept/
https://www.rufoguerreschi.com/2015/11/12/welcome-to-linear-city-2-0-a-social-and-human-urban-redevelopment-concept/#respondThu, 12 Nov 2015 07:43:02 +0000http://www.rufoguerreschi.com/?p=1110Continue reading →]]>https://www.rufoguerreschi.com/2015/11/12/welcome-to-linear-city-2-0-a-social-and-human-urban-redevelopment-concept/feed/01110Some comments on the Preamble of the Italian Internet “Bill of Rights”https://www.rufoguerreschi.com/2015/11/10/some-comments-on-the-preamble-of-the-italian-internet-bill-of-rights/
https://www.rufoguerreschi.com/2015/11/10/some-comments-on-the-preamble-of-the-italian-internet-bill-of-rights/#respondTue, 10 Nov 2015 15:09:10 +0000http://www.rufoguerreschi.com/?p=1108Continue reading →]]>https://www.rufoguerreschi.com/2015/11/10/some-comments-on-the-preamble-of-the-italian-internet-bill-of-rights/feed/01108Richard Hawking on the great risks of the “default” scenarios for the future of AIhttps://www.rufoguerreschi.com/2015/10/14/richard-hawkings-on-the-great-risks-of-the-defualt-scenarios-for-the-future-of-ai/
https://www.rufoguerreschi.com/2015/10/14/richard-hawkings-on-the-great-risks-of-the-defualt-scenarios-for-the-future-of-ai/#respondWed, 14 Oct 2015 14:40:22 +0000http://www.rufoguerreschi.com/?p=1101Continue reading →]]>https://www.rufoguerreschi.com/2015/10/14/richard-hawkings-on-the-great-risks-of-the-defualt-scenarios-for-the-future-of-ai/feed/01101Is meaningful trustworthiness a requirement of Free Software “computing freedom”?https://www.rufoguerreschi.com/2015/10/13/is-meaningful-trustworthiness-a-requirement-of-free-software-computing-freedom/
https://www.rufoguerreschi.com/2015/10/13/is-meaningful-trustworthiness-a-requirement-of-free-software-computing-freedom/#respondTue, 13 Oct 2015 10:53:14 +0000http://www.rufoguerreschi.com/?p=1094Continue reading →]]>https://www.rufoguerreschi.com/2015/10/13/is-meaningful-trustworthiness-a-requirement-of-free-software-computing-freedom/feed/01094How could the US government incentivize IT service providers to voluntarily and adequately provide compliance to lawful access?!https://www.rufoguerreschi.com/2015/10/13/how-could-the-us-government-incentivize-it-service-providers-to-voluntarily-and-adequately-provide-compliance-to-lawful-access/
https://www.rufoguerreschi.com/2015/10/13/how-could-the-us-government-incentivize-it-service-providers-to-voluntarily-and-adequately-provide-compliance-to-lawful-access/#respondTue, 13 Oct 2015 08:54:14 +0000http://www.rufoguerreschi.com/?p=1090Continue reading →]]>https://www.rufoguerreschi.com/2015/10/13/how-could-the-us-government-incentivize-it-service-providers-to-voluntarily-and-adequately-provide-compliance-to-lawful-access/feed/01090A Proposed Solution to Wikimedia funding problem …https://www.rufoguerreschi.com/2015/10/07/a-proposed-solution-to-wikimedia-funding-problem/
https://www.rufoguerreschi.com/2015/10/07/a-proposed-solution-to-wikimedia-funding-problem/#respondWed, 07 Oct 2015 08:27:20 +0000http://www.rufoguerreschi.com/?p=1084Continue reading →]]>https://www.rufoguerreschi.com/2015/10/07/a-proposed-solution-to-wikimedia-funding-problem/feed/01084“f no values-based standards exist for Artificial Intelligence, then the biases of its manufacturers will define our universal code of human ethics. But this should not be their cross to bear alone. It’s time to stop vilifying the AI community and start defining in concert with their creations what the good life means surrounding our consciousness and code.”https://www.rufoguerreschi.com/2015/10/05/f-no-values-based-standards-exist-for-artificial-intelligence-then-the-biases-of-its-manufacturers-will-define-our-universal-code-of-human-ethics-but-this-should-not-be-their-cross-to-bear-alone/
https://www.rufoguerreschi.com/2015/10/05/f-no-values-based-standards-exist-for-artificial-intelligence-then-the-biases-of-its-manufacturers-will-define-our-universal-code-of-human-ethics-but-this-should-not-be-their-cross-to-bear-alone/#respondMon, 05 Oct 2015 15:45:38 +0000http://www.rufoguerreschi.com/?p=1082https://www.rufoguerreschi.com/2015/10/05/f-no-values-based-standards-exist-for-artificial-intelligence-then-the-biases-of-its-manufacturers-will-define-our-universal-code-of-human-ethics-but-this-should-not-be-their-cross-to-bear-alone/feed/01082” Now imagine that some fiendish crime syndicate were to steal such a car, strap a gun to the top, and reprogram it to shoot people. That’s an AI weapon.”https://www.rufoguerreschi.com/2015/08/21/now-imagine-that-some-fiendish-crime-syndicate-were-to-steal-such-a-car-strap-a-gun-to-the-top-and-reprogram-it-to-shoot-people-thats-an-ai-weapon/
https://www.rufoguerreschi.com/2015/08/21/now-imagine-that-some-fiendish-crime-syndicate-were-to-steal-such-a-car-strap-a-gun-to-the-top-and-reprogram-it-to-shoot-people-thats-an-ai-weapon/#respondFri, 21 Aug 2015 19:04:10 +0000http://www.rufoguerreschi.com/?p=1069https://www.rufoguerreschi.com/2015/08/21/now-imagine-that-some-fiendish-crime-syndicate-were-to-steal-such-a-car-strap-a-gun-to-the-top-and-reprogram-it-to-shoot-people-thats-an-ai-weapon/feed/01069The robots aren’t taking our jobs; they’re taking our leisurehttps://www.rufoguerreschi.com/2015/08/01/the-robots-arent-taking-our-jobs-theyre-taking-our-leisure/
https://www.rufoguerreschi.com/2015/08/01/the-robots-arent-taking-our-jobs-theyre-taking-our-leisure/#respondSat, 01 Aug 2015 15:22:36 +0000http://www.rufoguerreschi.com/?p=1066Continue reading →]]>https://www.rufoguerreschi.com/2015/08/01/the-robots-arent-taking-our-jobs-theyre-taking-our-leisure/feed/01066Blaming China for cyber attacks without any public evidence creates highly-perverse dynamicshttps://www.rufoguerreschi.com/2015/08/01/blaming-china-for-cyber-attacks-without-any-public-evidence-creates-highly-perverse-dynamics-1-breached-entity-risk-of-liabilityblame-for-decides-to-retaliate-against-chinas-hacking-n/
https://www.rufoguerreschi.com/2015/08/01/blaming-china-for-cyber-attacks-without-any-public-evidence-creates-highly-perverse-dynamics-1-breached-entity-risk-of-liabilityblame-for-decides-to-retaliate-against-chinas-hacking-n/#respondSat, 01 Aug 2015 09:44:05 +0000http://www.rufoguerreschi.com/?p=1060Continue reading →]]>https://www.rufoguerreschi.com/2015/08/01/blaming-china-for-cyber-attacks-without-any-public-evidence-creates-highly-perverse-dynamics-1-breached-entity-risk-of-liabilityblame-for-decides-to-retaliate-against-chinas-hacking-n/feed/01060A definition of “Constitutionally-meanigful levels of trustworthiness” in IT systemshttps://www.rufoguerreschi.com/2015/07/20/a-definition-of-constitutionally-meanigful-levels-of-trustworthiness-in-it-systems/
https://www.rufoguerreschi.com/2015/07/20/a-definition-of-constitutionally-meanigful-levels-of-trustworthiness-in-it-systems/#respondMon, 20 Jul 2015 11:06:06 +0000http://www.rufoguerreschi.com/?p=1056Continue reading →]]>https://www.rufoguerreschi.com/2015/07/20/a-definition-of-constitutionally-meanigful-levels-of-trustworthiness-in-it-systems/feed/01056Motives of the Hacking Team hack may have much in common with those that broughtin 1903 the British Mr Maskelyne – and possibly its UK corporate/state sponsors – to hack Marconi’s radio telegraph in 1903 …https://www.rufoguerreschi.com/2015/07/15/motives-of-the-hacking-team-hack-may-have-much-in-common-with-those-that-broughtin-1903-the-british-mr-maskelyne-and-possibly-its-uk-corporatestate-sponsors-to-hack-marconis-radio-telegraph-in/
https://www.rufoguerreschi.com/2015/07/15/motives-of-the-hacking-team-hack-may-have-much-in-common-with-those-that-broughtin-1903-the-british-mr-maskelyne-and-possibly-its-uk-corporatestate-sponsors-to-hack-marconis-radio-telegraph-in/#respondWed, 15 Jul 2015 10:53:46 +0000http://www.rufoguerreschi.com/?p=1050Continue reading →]]>https://www.rufoguerreschi.com/2015/07/15/motives-of-the-hacking-team-hack-may-have-much-in-common-with-those-that-broughtin-1903-the-british-mr-maskelyne-and-possibly-its-uk-corporatestate-sponsors-to-hack-marconis-radio-telegraph-in/feed/01050if sousveillance tools do not have sufficiently extreme levels of security and user-accoutability, they become additional tool of the powers-that-be…https://www.rufoguerreschi.com/2015/07/13/if-sousveillance-tools-do-not-have-sufficiently-extreme-levels-of-security-and-user-accoutability-they-become-additional-tool-of-the-powers-that-be/
https://www.rufoguerreschi.com/2015/07/13/if-sousveillance-tools-do-not-have-sufficiently-extreme-levels-of-security-and-user-accoutability-they-become-additional-tool-of-the-powers-that-be/#respondMon, 13 Jul 2015 10:23:01 +0000http://www.rufoguerreschi.com/2015/07/13/if-sousveillance-tools-do-not-have-sufficiently-extreme-levels-of-security-and-user-accoutability-they-become-additional-tool-of-the-powers-that-be/Continue reading →]]>https://www.rufoguerreschi.com/2015/07/13/if-sousveillance-tools-do-not-have-sufficiently-extreme-levels-of-security-and-user-accoutability-they-become-additional-tool-of-the-powers-that-be/feed/01046Who sets the security standards for lawful access systems like Hacking Team team?!https://www.rufoguerreschi.com/2015/07/10/who-sets-the-security-standards-for-lawful-access-systems-like-hacking-team-team/
https://www.rufoguerreschi.com/2015/07/10/who-sets-the-security-standards-for-lawful-access-systems-like-hacking-team-team/#respondFri, 10 Jul 2015 08:17:45 +0000http://www.rufoguerreschi.com/?p=1040Continue reading →]]>https://www.rufoguerreschi.com/2015/07/10/who-sets-the-security-standards-for-lawful-access-systems-like-hacking-team-team/feed/01040Hacking Team on the relative morality of their general line of businesshttps://www.rufoguerreschi.com/2015/07/08/hacking-team-on-the-relative-morality-of-their-general-line-of-business/
https://www.rufoguerreschi.com/2015/07/08/hacking-team-on-the-relative-morality-of-their-general-line-of-business/#respondWed, 08 Jul 2015 12:58:17 +0000http://www.rufoguerreschi.com/?p=1031Continue reading →]]>https://www.rufoguerreschi.com/2015/07/08/hacking-team-on-the-relative-morality-of-their-general-line-of-business/feed/01031Adi Shamir: ” “In the Second World War if you had good crypto protecting your communication you were safe. Today with an APT sitting inside your most secure computer systems, using cryptography isn’t going to give you much protection.”https://www.rufoguerreschi.com/2015/03/22/adi-shamir-in-the-second-world-war-if-you-had-good-crypto-protecting-your-communication-you-were-safe-today-with-an-apt-sitting-inside-your-most-secure-computer-systems-using-cryptography-isn/
https://www.rufoguerreschi.com/2015/03/22/adi-shamir-in-the-second-world-war-if-you-had-good-crypto-protecting-your-communication-you-were-safe-today-with-an-apt-sitting-inside-your-most-secure-computer-systems-using-cryptography-isn/#respondSun, 22 Mar 2015 14:34:32 +0000http://www.rufoguerreschi.com/?p=1017Continue reading →]]>https://www.rufoguerreschi.com/2015/03/22/adi-shamir-in-the-second-world-war-if-you-had-good-crypto-protecting-your-communication-you-were-safe-today-with-an-apt-sitting-inside-your-most-secure-computer-systems-using-cryptography-isn/feed/01017Panopticon sounds very much like the post-Snoden world for all of ushttps://www.rufoguerreschi.com/2015/03/03/panopticon-sounds-very-much-like-the-post-snoden-world-for-all-of-us/
https://www.rufoguerreschi.com/2015/03/03/panopticon-sounds-very-much-like-the-post-snoden-world-for-all-of-us/#respondTue, 03 Mar 2015 17:01:25 +0000http://www.rufoguerreschi.com/?p=1006Continue reading →]]>https://www.rufoguerreschi.com/2015/03/03/panopticon-sounds-very-much-like-the-post-snoden-world-for-all-of-us/feed/01006thinkst Thoughts…: If the NSA has been hacking everything, how has nobody seen them coming?https://www.rufoguerreschi.com/2015/02/13/thinkst-thoughts-if-the-nsa-has-been-hacking-everything-how-has-nobody-seen-them-coming/
https://www.rufoguerreschi.com/2015/02/13/thinkst-thoughts-if-the-nsa-has-been-hacking-everything-how-has-nobody-seen-them-coming/#respondFri, 13 Feb 2015 13:44:20 +0000http://www.rufoguerreschi.com/?p=999https://www.rufoguerreschi.com/2015/02/13/thinkst-thoughts-if-the-nsa-has-been-hacking-everything-how-has-nobody-seen-them-coming/feed/0999” BIOS and firmware-level attacks were somewhat common in the late 80s and early 90s. At that point, when the Internet took rise, probably around the advent of Windows 95, it became easy enough for “hobbiest” hackers to forget about the more difficult task of infiltrating hardware and focus on the software. But clearly the NSA had the resources and inclination to keep focus on the lowest level.”https://www.rufoguerreschi.com/2015/02/13/bios-and-firmware-level-attacks-were-somewhat-common-in-the-late-80s-and-early-90s-at-that-point-when-the-internet-took-rise-probably-around-the-advent-of-windows-95-it-became-easy-enough-for/
https://www.rufoguerreschi.com/2015/02/13/bios-and-firmware-level-attacks-were-somewhat-common-in-the-late-80s-and-early-90s-at-that-point-when-the-internet-took-rise-probably-around-the-advent-of-windows-95-it-became-easy-enough-for/#respondFri, 13 Feb 2015 13:44:01 +0000http://www.rufoguerreschi.com/?p=997https://www.rufoguerreschi.com/2015/02/13/bios-and-firmware-level-attacks-were-somewhat-common-in-the-late-80s-and-early-90s-at-that-point-when-the-internet-took-rise-probably-around-the-advent-of-windows-95-it-became-easy-enough-for/feed/0997” Orwell thought we would be destroyed by the things we fear, particularly comprehensive surveillance. Huxley conjectured that we would be destroyed by the things that delight us. As it happens, we’ve wound up with both. NSA/GCHQ are doing the Orwellian stuff, while Google, Facebook, Apple, Yahoo, Microsoft, Skype et al are taking care of the Huxleyan side of things.”https://www.rufoguerreschi.com/2015/02/05/orwell-thought-we-would-be-destroyed-by-the-things-we-fear-particularly-comprehensive-surveillance-huxley-conjectured-that-we-would-be-destroyed-by-the-things-that-delight-us-as-it-happens-we/
https://www.rufoguerreschi.com/2015/02/05/orwell-thought-we-would-be-destroyed-by-the-things-we-fear-particularly-comprehensive-surveillance-huxley-conjectured-that-we-would-be-destroyed-by-the-things-that-delight-us-as-it-happens-we/#respondThu, 05 Feb 2015 13:30:36 +0000http://www.rufoguerreschi.com/?p=995https://www.rufoguerreschi.com/2015/02/05/orwell-thought-we-would-be-destroyed-by-the-things-we-fear-particularly-comprehensive-surveillance-huxley-conjectured-that-we-would-be-destroyed-by-the-things-that-delight-us-as-it-happens-we/feed/0995Privacy Intl on why targeted end-point is almost as low cost as passive surveillancehttps://www.rufoguerreschi.com/2015/02/04/privacy-intl-on-why-targeted-end-point-is-almost-as-low-cost-as-passive-surveillance/
https://www.rufoguerreschi.com/2015/02/04/privacy-intl-on-why-targeted-end-point-is-almost-as-low-cost-as-passive-surveillance/#respondWed, 04 Feb 2015 19:06:27 +0000http://www.rufoguerreschi.com/?p=993https://www.rufoguerreschi.com/2015/02/04/privacy-intl-on-why-targeted-end-point-is-almost-as-low-cost-as-passive-surveillance/feed/0993Privacy Intl’: ” You do not have to choose between privacy and security….”https://www.rufoguerreschi.com/2015/02/04/privacy-intl-you-do-not-have-to-choose-between-privacy-and-security/
https://www.rufoguerreschi.com/2015/02/04/privacy-intl-you-do-not-have-to-choose-between-privacy-and-security/#respondWed, 04 Feb 2015 19:06:16 +0000http://www.rufoguerreschi.com/?p=991Continue reading →]]>https://www.rufoguerreschi.com/2015/02/04/privacy-intl-you-do-not-have-to-choose-between-privacy-and-security/feed/0991” If attackers located in country A compromise a device that was made in country B, installed in country C, and exfiltrates data to country D, which rules apply?”https://www.rufoguerreschi.com/2015/02/04/if-attackers-located-in-country-a-compromise-a-device-that-was-made-in-country-b-installed-in-country-c-and-exfiltrates-data-to-country-d-which-rules-apply/
https://www.rufoguerreschi.com/2015/02/04/if-attackers-located-in-country-a-compromise-a-device-that-was-made-in-country-b-installed-in-country-c-and-exfiltrates-data-to-country-d-which-rules-apply/#respondWed, 04 Feb 2015 17:34:41 +0000http://www.rufoguerreschi.com/?p=989https://www.rufoguerreschi.com/2015/02/04/if-attackers-located-in-country-a-compromise-a-device-that-was-made-in-country-b-installed-in-country-c-and-exfiltrates-data-to-country-d-which-rules-apply/feed/0989Schneier late 2013:” Basically, the NSA asks companies to subtly change their products in undetectable ways: making the random number generator less random, leaking the key somehow, adding a common exponent to a public-key exchange protocol, and so on. If the back door is discovered, it’s explained away as a mistake.”https://www.rufoguerreschi.com/2015/02/04/schneier-late-2013-basically-the-nsa-asks-companies-to-subtly-change-their-products-in-undetectable-ways-making-the-random-number-generator-less-random-leaking-the-key-somehow-adding-a-common-e/
https://www.rufoguerreschi.com/2015/02/04/schneier-late-2013-basically-the-nsa-asks-companies-to-subtly-change-their-products-in-undetectable-ways-making-the-random-number-generator-less-random-leaking-the-key-somehow-adding-a-common-e/#respondWed, 04 Feb 2015 04:38:49 +0000http://www.rufoguerreschi.com/?p=987https://www.rufoguerreschi.com/2015/02/04/schneier-late-2013-basically-the-nsa-asks-companies-to-subtly-change-their-products-in-undetectable-ways-making-the-random-number-generator-less-random-leaking-the-key-somehow-adding-a-common-e/feed/0987Salesforce CEO ON need for “radical transparency” to regain trust. ” “Trust is a serious problem, we have to get to a new level of transparency – only through radical transparency will we get to radical new levels of trust.”https://www.rufoguerreschi.com/2015/01/23/salesforce-ceo-on-need-for-radical-transparency-to-regain-trust-trust-is-a-serious-problem-we-have-to-get-to-a-new-level-of-transparency-only-through-radical-transparency/
https://www.rufoguerreschi.com/2015/01/23/salesforce-ceo-on-need-for-radical-transparency-to-regain-trust-trust-is-a-serious-problem-we-have-to-get-to-a-new-level-of-transparency-only-through-radical-transparency/#respondFri, 23 Jan 2015 04:44:56 +0000http://www.rufoguerreschi.com/?p=985https://www.rufoguerreschi.com/2015/01/23/salesforce-ceo-on-need-for-radical-transparency-to-regain-trust-trust-is-a-serious-problem-we-have-to-get-to-a-new-level-of-transparency-only-through-radical-transparency/feed/0985John Maynard Keynes 1953 : “Will the discontented peoples of Europe be willing for a generation to come so to order their lives that an appreciable part of their daily produce may be available to meet a foreign payment, the reason of which … does not spring compellingly from their sense of justice or duty?” he asked. Greece profit from German history | Jeffrey Sachs | Comment is free | The Guardianhttps://www.rufoguerreschi.com/2015/01/22/john-maynard-keynes-1953-will-the-discontented-peoples-of-europe-be-willing-for-a-generation-to-come-so-to-order-their-lives-that-an-appreciable-part-of-their-daily-produce-may-be-available/
https://www.rufoguerreschi.com/2015/01/22/john-maynard-keynes-1953-will-the-discontented-peoples-of-europe-be-willing-for-a-generation-to-come-so-to-order-their-lives-that-an-appreciable-part-of-their-daily-produce-may-be-available/#respondThu, 22 Jan 2015 12:28:52 +0000http://www.rufoguerreschi.com/?p=983https://www.rufoguerreschi.com/2015/01/22/john-maynard-keynes-1953-will-the-discontented-peoples-of-europe-be-willing-for-a-generation-to-come-so-to-order-their-lives-that-an-appreciable-part-of-their-daily-produce-may-be-available/feed/0983UK’s Cameron: “In extremis, it has been possible to read someone’s letter, to listen to someone’s call, to listen in on mobile communications,” he said. “The question remains: are we going to allow a means of communications where it simply is not possible to do that? My answer to that question is: no, we must not.”https://www.rufoguerreschi.com/2015/01/18/uks-cameron-in-extremis-it-has-been-possible-to-read-someones-letter-to-listen-to-someones-call-to-listen-in-on-mobile-communications-he-said-the-q/
https://www.rufoguerreschi.com/2015/01/18/uks-cameron-in-extremis-it-has-been-possible-to-read-someones-letter-to-listen-to-someones-call-to-listen-in-on-mobile-communications-he-said-the-q/#respondSun, 18 Jan 2015 02:55:42 +0000http://www.rufoguerreschi.com/?p=979https://www.rufoguerreschi.com/2015/01/18/uks-cameron-in-extremis-it-has-been-possible-to-read-someones-letter-to-listen-to-someones-call-to-listen-in-on-mobile-communications-he-said-the-q/feed/0979